


default search action
Wu Liu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Wu Liu 0001
— Fifth Electronic Research Institute of MIIT, Guangzhou, China - Wu Liu 0002
— Hong Kong Polytechnic University, Kowloon, Hong Kong, SAR, China - Wu Liu 0003
— Stanford University, CA, USA - Wu Liu 0004
— Shanghai Jiao Tong University, Shanghai, China - Wu Liu 0005
— University of Science and Technology of China, Heifei, Anhui, China - Wu Liu 0006
— CCCC Highway Consultants, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j17]Qing Yao, Jun Gong, Helin Lu, Wu Liu, Liqiong Ding:
Advancing pesticide discrimination: a critical review of sensor array technologies, challenges, and future pathways. Comput. Electron. Agric. 245: 111590 (2026)- 2025
[j16]Hang Yang, Chuanghua Yang, Dan Yang, Xiaojing Hang, Wu Liu:
RE-XswinUnet: Rotary Positional Encoding and Inter-Slice Contextual Connections for Multi-Organ Segmentation. Big Data Cogn. Comput. 9(11): 274 (2025)
[j15]Zijun Wang, Xi Liu, Kaitai Han, Lixin Lei, Chaojing Shi
, Wu Liu, Qianjin Guo
:
Multimodal deep learning for immunotherapy response prediction and biomarker discovery in non-small cell lung cancer. J. Am. Medical Informatics Assoc. 32(11): 1641-1653 (2025)
[c58]Alicia Li, Xiaodong Chen, Bohao Liang, Qian Bao, Wu Liu:
M-Adaptor: Text-driven Whole-body Human Motion Generation. CVPR Workshops 2025: 2604-2613
[c57]Yiwen Yang, Wu Liu, Han Li, Tianqian Zhang, Ming Luo:
Online-Trained Adaptive OSNR Equalization in C+L-Band Optical Networks. ECOC 2025: 1-4
[c56]Chen Chen, Xinlong Hao, Weiwen Liu, Xu Huang, Xingshan Zeng, Shuai Yu, Dexun Li, Yuefeng Huang, Xiangcheng Liu, Xinzhi Wang, Wu Liu:
ACEBench: A Comprehensive Evaluation of LLM Tool Usage. EMNLP (Findings) 2025: 12970-12998
[i5]Chen Chen, Xinlong Hao, Weiwen Liu
, Xu Huang, Xingshan Zeng
, Shuai Yu, Dexun Li, Shuai Wang, Weinan Gan, Yuefeng Huang, Wulong Liu, Xinzhi Wang, Defu Lian, Baoqun Yin, Yasheng Wang, Wu Liu:
ACEBench: Who Wins the Match Point in Tool Learning? CoRR abs/2501.12851 (2025)- 2024
[j14]Wenchao Du
, Xitong Guo, Tianshi Wu, Wu Liu, Doug Vogel:
The impact of online medical team participation on physicians' individual online service. Electron. Commer. Res. Appl. 68: 101468 (2024)
[j13]Zijun Wang, Kaitai Han, Wu Liu, Zhenghui Wang, Chaojing Shi, Xi Liu, Mengyuan Huang, Guocheng Sun, Shitou Liu, Qianjin Guo
:
Fast Real-Time Brain Tumor Detection Based on Stimulated Raman Histology and Self-Supervised Deep Learning Model. J. Imaging Inform. Medicine 37(3): 1160-1176 (2024)
[c55]Shuo Chen, Wu Liu, Binbin Yan, Xinzhu Sang, Alicia Li, Xiangcheng Yi:
Blender-NeRF: A Monocular Dynamic Human Body Explicit Reconstruction and Rendering Method. ICME Workshops 2024: 1-6
[c54]Zhiyi Zhong, Wu Liu, Ming Luo, Min Li, Xi Xiao:
Correlation-Based OTDR for High-Resolution Monitoring in Passive Optical Networks. OFC 2024: 1-3
[i4]Z. T. Wang, Qiuhao Chen, Yuxuan Du, Z. H. Yang, Xiaoxia Cai, Kaixuan Huang, Jingning Zhang, Kai Xu, Jun Du, Yinan Li, Yuling Jiao, Xingyao Wu, Wu Liu, Xiliang Lu, Huikai Xu, Yirong Jin, Ruixia Wang, Haifeng Yu, S. P. Zhao:
Quantum Compiling with Reinforcement Learning on a Superconducting Processor. CoRR abs/2406.12195 (2024)
[i3]Ray Friedman, Jaewoo Cho, Jeanne M. Brett, Xuhui Zhan, Ningyu Han, Sriram Kannan, Yingxiang Ma, Jesse Spencer-Smith, Elisabeth Jäckel, Alfred Zerres, Madison Hooper, Katie Babbit, Manish Acharya, Wendi L. Adair, Soroush Aslani, Tayfun Aykaç, Chris Bauman, Rebecca Bennett, Garrett Brady
, Peggy Briggs, Cheryl Dowie, Chase Eck, Ingmar Geiger, Frank Jacob, Molly Kern, Sujin Lee, Leigh Anne Liu, Wu Liu, Jeffrey Loewenstein, Anne Lytle, Li Ma, Michel Mann, Alexandra Mislin, Tyree Mitchell, Hannah Martensen née Nagler, Amit Nandkeolyar, Mara Olekalns, Elena Paliakova, Jennifer Parlamis, Jason Pierce, Nancy Pierce, Robin Pinkley, Nathalie Prime, Jimena Ramirez-Marin, Kevin Rockmann, William Ross, Zhaleh Semnani-Azad, Juliana Schroeder, Philip Smith, Elena Stimmer, Roderick Swaab, Leigh Thompson, Cathy Tinsley, Ece Tuncel, Laurie R. Weingart, Robert Wilken, JingJing Yao, Zhi-Xue Zhang:
An Application of Large Language Models to Coding Negotiation Transcripts. CoRR abs/2407.21037 (2024)- 2023
[c53]Wu Liu, Yue Li, Mingxing Nie:
Multitask Learning-Based Early MTT Partition Decision for Versatile Video Coding. CICAI (2) 2023: 488-499
[c52]Xiaoshuo Jia, Ming Luo, Yan Li, Chao Yang, Wu Liu, Xiaobin Hong, Hongxiang Guo, Jifang Qiu, Jian Wu:
Demonstration of Polar Coded Truncated Probabilistic Shaped 64-QAM Transmission over 2000-km G.654E Fiber. OFC 2023: 1-3
[c51]Wenchao Du, Wu Liu, Xitong Guo, Doug Vogel:
Exploring the role of the transactive memory system in virtual team resilience: Evidence from online medical teams. PACIS 2023: 67- 2022
[c50]Xiaoying Huang, Rui Yin, Wu Liu, Hong Zhang:
Software Operation Simulation Method based On Complex Network Game. DSA 2022: 629-635
[c49]Yikang Shao, Wu Liu, Jun Ai, Chunhui Yang:
A Quantitative Measurement Method of Code Quality Evaluation Indicators based on Data Mining. DSA 2022: 659-669
[c48]Haoxiang Shi, Wu Liu, Jingyu Liu
, Jun Ai, Chunhui Yang:
A Software Defect Location Method based on Static Analysis Results. DSA 2022: 876-886
[i2]Ruiqing Yan, Fan Zhang, Mengyuan Huang, Wu Liu, Dongyu Hu, Jinfeng Li, Qiang Liu, Jingrong Jiang, Qianjin Guo, Linghan Zheng:
CAINNFlow: Convolutional block Attention modules and Invertible Neural Networks Flow for anomaly detection and localization tasks. CoRR abs/2206.01992 (2022)- 2021
[c47]Michael Chau, Melody M. Chao, Wu Liu:
Detecting Emotional Distress from Text. AMCIS 2021
[c46]Min Ren, Lingxiao He, Xingyu Liao, Wu Liu, Yunlong Wang, Tieniu Tan:
Learning Instance-level Spatial-Temporal Patterns for Person Re-identification. ICCV 2021: 14910-14919
[c45]Mingcan Xiang
, Yinglu Liu, Tingting Liao, Xiangyu Zhu
, Can Yang, Wu Liu, Hailin Shi:
The 3rd Grand Challenge of Lightweight 106-Point Facial Landmark Localization on Masked Faces. ICME Workshops 2021: 1-6
[e1]Changwen Chen, Helen Huang, Jun Zhou, Tatsuya Harada, Jianfei Cai, Wu Liu, Dong Xu:
MMAsia '21: ACM Multimedia Asia, Gold Coast, Australia, December 1 - 3, 2021. ACM 2021, ISBN 978-1-4503-8607-4 [contents]
[i1]Min Ren, Lingxiao He, Xingyu Liao, Wu Liu, Yunlong Wang, Tieniu Tan:
Learning Instance-level Spatial-Temporal Patterns for Person Re-identification. CoRR abs/2108.00171 (2021)- 2020
[j12]Wu Liu, Longxuan Hui, Yuting Lu, Jinsong Tang:
Developing an evaluation method for SCADA-Controlled urban gas infrastructure hierarchical design using multi-level fuzzy comprehensive evaluation. Int. J. Crit. Infrastructure Prot. 30: 100375 (2020)
[j11]Wu Liu, Yanli Du, Erwin Mooij, Haibing Lin:
Incremental backstepping robust fault-tolerant control with improved IHSTD for RLVs. Int. J. Model. Identif. Control. 35(3): 226-240 (2020)
[c44]Lingxiao He, Wu Liu:
Guided Saliency Feature Learning for Person Re-identification in Crowded Scenes. ECCV (28) 2020: 357-373
[c43]Guangrui Li, Guoliang Kang, Wu Liu, Yunchao Wei, Yi Yang:
Content-Consistent Matching for Domain Adaptive Semantic Segmentation. ECCV (14) 2020: 440-456
[c42]Xiruo Shi, Liutong Xu, Pengfei Wang
, Yuanyuan Gao, Haifang Jian, Wu Liu:
Beyond the Attention: Distinguish the Discriminative and Confusable Features For Fine-grained Image Classification. ACM Multimedia 2020: 601-609
[c41]Wu Liu, Xiang Li, Chao Yang, Ming Luo:
Modulation Classification based on Deep Learning for DMT Subcarriers in VLC System. OFC 2020: 1-3
2010 – 2019
- 2019
[c40]Haibing Lin, Yanli Du, Erwin Mooij, Wu Liu:
Improved Predictor-Corrector Guidance with Hybrid Lateral Logic for No-fly Zone Avoidance. ICCAIS 2019: 1-6
[c39]Wei He, Xiaobo Ke, Helen S. Du, Wu Liu:
Social Media-Enabled Individual Dynamic Capabilities: The Boundary Spanning Perspective. PACIS 2019: 227- 2018
[j10]Zhongdong Yang
, Yuquan Zhen, Zenshan Yin, Chao Lin, Yanmeng Bi, Wu Liu, Qian Wang, Long Wang, Songyan Gu, Longfei Tian:
Prelaunch Radiometric Calibration of the TanSat Atmospheric Carbon Dioxide Grating Spectrometer. IEEE Trans. Geosci. Remote. Sens. 56(7): 4225-4233 (2018)
[c38]Jian Jiang, Jia Zhang
, Hai-Xin Duan
, Kang Li, Wu Liu:
Analysis and Measurement of Zone Dependency in the Domain Name System. ICC 2018: 1-7
[c37]Zhixue He, Wu Liu, Chenhui Xie, Songnian Fu, Xiang Li, Chao Yang, Qi Yang:
Achievable Information Rate Enhancement of Visible Light Communication Using Probabilistically Shaped OFDM Modulation. OFC 2018: 1-3- 2017
[j9]Haipeng Wang, Yan Gong, Wu Liu, Ze Li, Simei Zhang:
一种时空多尺度适应的手势识别方法研究 (Study on Spatial-Temporal Multiscale Adaptive Method of Gesture Recognition). 计算机科学 44(12): 287-291 (2017)
[j8]Wu Liu, James E. Fowler
, Chunhui Zhao:
Spatial Logistic Regression for Support-Vector Classification of Hyperspectral Imagery. IEEE Geosci. Remote. Sens. Lett. 14(3): 439-443 (2017)
[j7]Wu Liu, Peng Cui, Jukka K. Nurminen
, Jingdong Wang
:
Special issue on intelligent urban computing with big data. Mach. Vis. Appl. 28(7): 675-677 (2017)
[c36]Jia Zhang
, Hai-Xin Duan
, Wu Liu, Xingkun Yao:
How to Notify a Vulnerability to the Right Person? Case Study: In an ISP Scope. GLOBECOM 2017: 1-7
[c35]Wu Liu, Ping Ren, Donghong Sun, Ke Liu:
H6Proxy: Address forging and data-gram forwarding based attack testing proxy system in IPv6 network. DSP 2017: 1-5- 2016
[c34]Wu Liu, Ping Ren, Ke Liu, Li Xing, Jian-Ping Wu:
Analysis and forensics for behavior characteristics of malware in Internet. DSP 2016: 545-549
[c33]Donghong Sun, Wu Liu, Ping Ren, Ke Liu:
Reputation and attribute based dynamic access control framework in cloud computing environment for privacy protection. ICNC-FSKD 2016: 1239-1245
[c32]Ping Ren, Wu Liu, Donghong Sun, Jian-Ping Wu, Ke Liu:
Analysis and forensics for Behavior Characteristics of Malware in Internet. PST 2016: 637-641
[c31]Jihu Zhang, Haipeng Wang, Wu Liu, Yan Gong, Yunwei Dong, Xiaochuan Jing, Wei Zhang:
Safety Awareness Online Detection System of Driving Behavior Based on Software and Hardware Co-design. QRS Companion 2016: 395-399- 2015
[c30]Ping Ren, Wu Liu, Donghong Sun, Ke Liu:
Node Localization based on Convex Optimization in Wireless Sensor Networks. FSKD 2015: 2169-2173
[c29]Wu Liu, Ping Ren, Donghong Sun, Yawei Zhao, Ke Liu:
Study on attacking and defending techniques in IPv6 networks. DSP 2015: 48-53
[c28]Bin Wang, Sheng Tang, Ruizhen Zhao, Wu Liu, Yigang Cen:
Pedestrian detection based on Region Proposal Fusion. MMSP 2015: 1-6
[c27]Yiqin Chen, Chao Yang, Qi Yang, Wu Liu, Chao Li, Dawei Zhang:
Wavelet transform-OFDM in indoor visible light communication. OFC 2015: 1-3- 2014
[j6]Haifeng Zhu, Chunhui Zhao, Wu Liu:
Sub-pixel mapping of remote-sensing imagery based on chaotic quantum bee colony algorithm. Int. J. Comput. Sci. Math. 5(1): 61-71 (2014)- 2013
[c26]Ping Ren, Wu Liu, Donghong Sun:
Partition-based data cube storage and parallel queries for cloud computing. ICNC 2013: 1183-1187
[c25]Junwen Deng, Liu Yang, Xinrong Cheng, Wu Liu:
Self-tuning PID-type Fuzzy Adaptive Control for CRAC in Datacenters. CCTA (1) 2013: 215-225
[c24]Wei-Yang Lin, Shu-Fang Lin, Sheng-Chang Yang, Shu-Cheng Liou, Wu Liu:
Real-time marker tracking for MV treatment beam imaging. ISCE 2013: 227-228- 2012
[c23]Dongbin Sun, Wu Liu, Donghong Sun, Ping Ren:
Study on Anti-Attack Model for Low-Latency Anonymous Communication System. CGC 2012: 327-328
[c22]Wu Liu, Donghong Sun, Ping Ren, Haibin Xiong:
Path-Calculation-Based XML Data Cube Model. ICHIT (1) 2012: 541-549- 2011
[j5]Jia Zhang, Hai-Xin Duan
, Wu Liu, Jianping Wu:
Anonymity analysis of P2P anonymous communication systems. Comput. Commun. 34(3): 358-366 (2011)
[c21]Wu Liu, Ping Ren, Ke Liu, Hai-Xin Duan
:
User cooperation trust model and its application in network security management. FSKD 2011: 2335-2339
[c20]Wu Liu, Hai-Xin Duan
, Ping Ren:
Cooperation-Based Trust Model and Its Application in Network Security Management. ICA3PP (1) 2011: 453-459- 2010
[c19]Jia Zhang
, Hai-Xin Duan
, Wu Liu, Jianping Wu:
Analysis of Anonymity in P2P Anonymous Communication Systems. AINA Workshops 2010: 860-865
[c18]Wu Liu, Hai-Xin Duan
, Ping Ren, Jianping Wu:
IABA: An improved PNN Algorithm for anomaly detection in network security management. ICNC 2010: 335-339
2000 – 2009
- 2009
[j4]Jia Zhang
, Hai-Xin Duan
, Wu Liu, Jianping Wu:
WindTalker: A P2P-Based Low-Latency Anonymous Communication Network. IEICE Trans. Commun. 92-B(10): 3183-3194 (2009)
[c17]Wu Liu, Min Li, Yi Liu, Yuan Xu, Xinglan Yang:
Decision of optimal scheduling scheme for gas field pipeline network based on hybrid genetic algorithm. GEC Summit 2009: 369-374- 2008
[j3]Hong Zhang, Hai-Xin Duan
, Wu Liu:
RRM: An incentive reputation model for promoting good behaviors in distributed systems. Sci. China Ser. F Inf. Sci. 51(11): 1871-1882 (2008)
[c16]Yuxiang Jia
, Dezhi Huang, Wu Liu, Shiwen Yu, Haila Wang:
Text normalization in mandarin text-to-speech system. ICASSP 2008: 4693-4696
[c15]Wu Liu, Hai-Xin Duan, Tao Lin, Xing Li, Jian-Ping Wu:
Attacking Test and Online Forensics in IPv6 Networks. IMF 2008: 87-106
[c14]Tao Zhou, Yuan Dong, Dezhi Huang, Wu Liu, Haila Wang:
A Three-Stage Text Normalization Strategy for Mandarin Text-to-Speech Systems. ISCSLP 2008: 125-128- 2007
[c13]Wu Liu, Dezhi Huang, Yuan Dong, Xinnian Mao, Haila Wang:
A pair-based language model for the robust lexical analysis in Chinese text-to-speech synthesis. INTERSPEECH 2007: 1905-1908- 2006
[c12]Wu Liu, Heng Li, Yuan Dong, Nan He, Haitao Luo, Haila Wang:
France Telecom R&D Beijing Word Segmenter for Sighan Bakeoff 2006. SIGHAN@COLING/ACL 2006: 122-125- 2005
[c11]Heng Li, Yuan Dong, Xinnian Mao, Haila Wang, Wu Liu:
Chinese Word Segmentation in FTRD Beijing. SIGHAN@IJCNLP 2005 2005
[c10]Hong Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
An Extensible AAA Infrastructure for IPv6. CIS (2) 2005: 482-487
[c9]Wu Liu, Hai-Xin Duan
, Jianping Wu, Xing Li:
PDTM: A Policy-Driven Trust Management Framework in Distributed Systems. CIS (2) 2005: 518-525
[c8]Wu Liu, Jianping Wu, Hai-Xin Duan
, Xing Li:
New Algorithm Mining Intrusion Patterns. FSKD (2) 2005: 774-777
[c7]Wu Liu, Jianping Wu, Hai-Xin Duan
, Xing Li:
New Method for Intrusion Features Mining in IDS. ICIC (1) 2005: 429-437
[c6]Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li:
The Authorization Service in Dynamic Trust Domains. ICITA (2) 2005: 564-567
[c5]Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li:
Improved Marking Model ERPPM Tracing Back to DDoS Attacker. ICITA (2) 2005: 759-762- 2004
[j2]Yong-Bin Li, Wu Liu, Xiao-Lin Xiang:
Geometry Theorem Proving by Decomposing Polynomial Systems into Strong Regular Sets. J. Comput. Sci. Technol. 19(6): 820-827 (2004)
[c4]Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping Ren:
XML Based X.509 Authorization in CERNET Grid. GCC 2004: 325-332
[c3]Wu Liu, Hai-Xin Duan
, Jianping Wu, Xing Li, Ping Ren:
Algorithms for Congestion Detection and Control. GCC Workshops 2004: 374-381
[c2]Wu Liu, Hai-Xin Duan, Yong Feng, Yong-Bin Li, Ping Ren:
Improved algorithms tracing back to attacking sources. Parallel and Distributed Computing and Networks 2004: 222-226- 2003
[c1]Wu Liu, Hai-Xin Duan
, Jianping Wu, Ping Ren, Li-Hua Lu:
Distributed IDS Tracing Back to Attacking Sources. GCC (1) 2003: 859-866
1990 – 1999
- 1993
[j1]Wu Liu, Kenichi Kanatani:
Interpretation of conic motion and its applications. Int. J. Comput. Vis. 10(1): 67-84 (1993)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-25 23:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







